Expected Findings
- `alg=none` tokens are accepted as valid.
- `kid` is concatenated into a file path with no normalization, enabling traversal.
- HS256 signing key is leaked through a debug endpoint.
The verify endpoint trusts the `alg` field from the token header, accepts `alg=none`, and follows `kid` paths into arbitrary files.
if header.alg == "none" { return claims, nil }
key = readFile("/keys/" + header.kid)